Katsuyuki Takashima

From MaRDI portal
Person:831630



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves
Commentarii Mathematici Universitatis Sancti Pauli
2024-11-13Paper
Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
Designs, Codes and Cryptography
2024-10-14Paper
Compact FE for unbounded attribute-weighted sums for logspace from SXDH
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Counting superspecial Richelot isogenies by reduced automorphism groups2022-11-25Paper
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
Information Security and Cryptology
2022-10-14Paper
Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence2022-10-07Paper
An efficient authenticated key exchange from random self-reducibility on CSIDH2022-03-24Paper
Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves2021-08-16Paper
Improved supersingularity testing of elliptic curves
JSIAM Letters
2021-07-05Paper
Counting Richelot isogenies between superspecial abelian surfaces
Open Book Series
2021-03-11Paper
Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
International Symposium on Mathematics, Quantum Theory, and Cryptography
2021-02-25Paper
Unbounded inner product functional encryption from bilinear maps
Japan Journal of Industrial and Applied Mathematics
2021-02-15Paper
Efficient attribute-based signatures for unbounded arithmetic branching programs2020-01-28Paper
One-round authenticated group key exchange from isogenies2020-01-10Paper
Fully secure functional encryption with a large class of relations from the decisional linear assumption
Journal of Cryptology
2019-11-27Paper
Supersingular isogeny Diffie-Hellman authenticated key exchange2019-03-29Paper
New assumptions on isogenous pairing groups with applications to attribute-based encryption2019-03-29Paper
Constructing an efficient hash function from \(3\)-isogenies
JSIAM Letters
2019-03-18Paper
Heuristic counting of Kachisa-Schaefer-Scott curves
JSIAM Letters
2019-03-18Paper
Adaptively simulation-secure attribute-hiding predicate encryption2019-01-23Paper
Unbounded inner product functional encryption from bilinear maps
Lecture Notes in Computer Science
2019-01-23Paper
New proof techniques for DLIN-based adaptively secure attribute-based encryption2017-08-25Paper
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders
Provable Security
2016-01-27Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
Designs, Codes and Cryptography
2015-10-26Paper
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
Lecture Notes in Computer Science
2014-10-14Paper
Predicate- and attribute-hiding inner product encryption in a public key setting
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Decentralized attribute-based signatures
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Fully secure unbounded inner-product and attribute-based encryption
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
Cryptology and Network Security
2012-07-20Paper
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Some key techniques on pairing vector spaces
Lecture Notes in Computer Science
2011-06-29Paper
Efficient attribute-based signatures for non-monotone predicates in the standard model
Public Key Cryptography – PKC 2011
2011-03-15Paper
Fully secure functional encryption with general relations from the decisional linear assumption
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Hierarchical Predicate Encryption for Inner-Products
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
AN ALGORITHM FOR COMPUTING A SEQUENCE OF RICHELOT ISOGENIES
Bulletin of the Korean Mathematical Society
2009-08-06Paper
Homomorphic Encryption and Signatures from Vector Decomposition
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
Efficiently Computable Distortion Maps for Supersingular Curves
Lecture Notes in Computer Science
2008-05-27Paper
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method
Lecture Notes in Computer Science
2008-03-17Paper


Research outcomes over time


This page was built for person: Katsuyuki Takashima